First published: Wed Mar 22 2023(Updated: )
Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by the missing of secure attribute in some configurations for JSESSIONID Cookie when using the RemoteIpFilter. By sniffing the network traffic, an attacker could exploit this vulnerability to obtain session cookie information, and use this information to launch further attacks against the affected system.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=8.5.0<8.5.86 | |
Apache Tomcat | >9.0.0<9.0.72 | |
Apache Tomcat | >10.1.0<10.1.6 | |
Apache Tomcat | =11.0.0-milestone1 | |
Apache Tomcat | =11.0.0-milestone2 | |
IBM Watson Knowledge Catalog on-prem | <=4.x | |
redhat/tomcat | <8.5.86 | 8.5.86 |
redhat/tomcat | <9.0.72 | 9.0.72 |
redhat/tomcat | <10.1.6 | 10.1.6 |
redhat/tomcat | <11.0.0 | 11.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28708
The severity of CVE-2023-28708 is high with a score of 7.5.
This vulnerability occurs when using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https.
Apache Tomcat versions 8.5.0 to 8.5.85, 9.0.0-M1 to 9.0.71, 10.1.0-M1 to 10.1.5, and 11.0.0-M1 to 11.0.0.-M2 are affected by this vulnerability.
To fix CVE-2023-28708, update Apache Tomcat to version 8.5.86, 9.0.72, 10.1.6, or 11.0.0 or later.